This update for jasper to version 1.900.14 fixes several issues.
These security issues were fixed:
- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919).
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).
- CVE-2016-1577: Double free vulnerability in the jas_iccattrval_destroy function in JasPer allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137 (bsc#968373).
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084).
- CVE-2016-8691, CVE-2016-8692: Missing range check on XRsiz and YRsiz fields of SIZ marker segment (bsc#1005090).
- CVE-2016-8693: The memory stream interface allowed for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free (bsc#1005242).
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591).
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593).
- CVE-2016-8882: Null pointer access in jpc_pi_destroy (bsc#1006597).
- CVE-2016-8883: Assert triggered in jpc_dec_tiledecode() (bsc#1006598).
- CVE-2016-8886: Memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599).
For additional change description please have a look at the changelog.
- Submitted by Fridrich Strba (fstrba)